Introduction to GLIBC Heap Exploitation
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Dive into the world of GLIBC heap exploitation in this comprehensive 90-minute conference talk presented at 44CON Information Security Conference. Explore the intricacies of heap memory management, common vulnerabilities, and advanced exploitation techniques. Learn how to identify and exploit heap-based vulnerabilities, understand the inner workings of the GLIBC allocator, and gain practical insights into crafting sophisticated heap exploits. Discover essential tools and methodologies used by security professionals to analyze and manipulate heap structures. Whether you're a beginner or an experienced security researcher, gain valuable knowledge to enhance your understanding of memory corruption vulnerabilities and improve your ability to secure systems against heap-based attacks.
Syllabus
Introduction To GLIBC Heap Exploitation - Max Kamper
Taught by
44CON Information Security Conference
Related Courses
Supply Chain Unchained - How To Be A Bad SaaS44CON Information Security Conference via YouTube Aviation Security 101
44CON Information Security Conference via YouTube The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube